无线MESH网络中的切换认证研究
发布时间:2018-09-01 05:35
【摘要】:随着人们对无线接入需求的增加和技术发展,无线MESH网络(Wireless Mesh Networs, WMNs)作为解决互联网“最后一公里”问题的关键技术,在工业和学术 领域得到广泛的应用和研究. 实现无缝和安全的切换一直是无线MESH网络研究中的重要课题。设计安全的切换认证协议以减少移动终端的切换时延,使用户在切换时仍能获得稳定和安全的无线连接,保护用户隐私,具有深刻的理论研究和现实意义。 本文从三个角度研究并分别设计了无线MESH网络中的切换认证方案:基于对称密码(Ticket)的切换认证协议,基于公钥密码(代理签名)的切换认证协议,具有隐私保护功能(利用盲签名)的切换认证协议。 1.基于Ticket的切换认证协议:在无线MESH网络中,利用对称密钥算法,在不需要第三方参与的情况下,设计了基于ticket的切换认证协议,在保证数据完整性和参与者有效性的前提下,有效减少切换过程中的计算和通信开销。 2.基于代理签名的切换认证协议:在无线MESH网络背景下,结合Mesh路由器的协作功能,利用公钥密码(代理签名),设计了本地切换认证协议(Local Joint Fast Handoff),使得认证服务器不需参与切换过程,降低通信时延。 3.利用盲签名实现隐私保护功能的切换认证协议:在保证低切换时延的前提下,利用盲签名和部分盲签名,使得无线MESH网络能够为用户提供身份匿名和基于假名的位置匿名服务。
[Abstract]:With the increasing demand for wireless access and the development of technology, wireless MESH network (Wireless Mesh Networs, WMNs), as a key technology to solve the "last kilometer" problem of the Internet, has been widely applied and studied in industry and academic fields. Seamless and secure handover has always been an important topic in the research of wireless MESH networks. The design of secure handover authentication protocol to reduce the handover delay of mobile terminals, make users can still obtain a stable and secure wireless connection while switching, and protect the privacy of users, which has profound theoretical research and practical significance. In this paper, the handoff authentication schemes in wireless MESH networks are studied and designed from three angles: the handoff authentication protocol based on symmetric cryptography (Ticket), the handoff authentication protocol based on public key cryptography (proxy signature), and the authentication protocol based on public key cryptography (proxy signature). Handoff authentication protocol with privacy protection (using blind signature). 1. Handoff authentication protocol based on Ticket: in wireless MESH network, using symmetric key algorithm and without the participation of third party, a handover authentication protocol based on ticket is designed to ensure the integrity of data and the validity of participants. Effective reduction of computing and communication overhead during handover. 2. Handoff Authentication Protocol based on proxy signature: under the background of wireless MESH network, combined with the cooperation function of Mesh router, Using public key cryptography (proxy signature), a local handoff authentication protocol (Local Joint Fast Handoff),) is designed to ensure that the authentication server does not need to participate in the handover process and reduces the communication delay. Blind signature is used to implement privacy protection handoff authentication protocol: under the premise of low handover delay, blind signature and partial blind signature are used to enable wireless MESH network to provide identity anonymity and pseudonym based location anonymity services for users.
【学位授予单位】:福建师范大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08
本文编号:2216256
[Abstract]:With the increasing demand for wireless access and the development of technology, wireless MESH network (Wireless Mesh Networs, WMNs), as a key technology to solve the "last kilometer" problem of the Internet, has been widely applied and studied in industry and academic fields. Seamless and secure handover has always been an important topic in the research of wireless MESH networks. The design of secure handover authentication protocol to reduce the handover delay of mobile terminals, make users can still obtain a stable and secure wireless connection while switching, and protect the privacy of users, which has profound theoretical research and practical significance. In this paper, the handoff authentication schemes in wireless MESH networks are studied and designed from three angles: the handoff authentication protocol based on symmetric cryptography (Ticket), the handoff authentication protocol based on public key cryptography (proxy signature), and the authentication protocol based on public key cryptography (proxy signature). Handoff authentication protocol with privacy protection (using blind signature). 1. Handoff authentication protocol based on Ticket: in wireless MESH network, using symmetric key algorithm and without the participation of third party, a handover authentication protocol based on ticket is designed to ensure the integrity of data and the validity of participants. Effective reduction of computing and communication overhead during handover. 2. Handoff Authentication Protocol based on proxy signature: under the background of wireless MESH network, combined with the cooperation function of Mesh router, Using public key cryptography (proxy signature), a local handoff authentication protocol (Local Joint Fast Handoff),) is designed to ensure that the authentication server does not need to participate in the handover process and reduces the communication delay. Blind signature is used to implement privacy protection handoff authentication protocol: under the premise of low handover delay, blind signature and partial blind signature are used to enable wireless MESH network to provide identity anonymity and pseudonym based location anonymity services for users.
【学位授予单位】:福建师范大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08
【参考文献】
相关期刊论文 前2条
1 李捷;王汝传;;一个无线环境下基于区分服务的域内快速切换方案[J];计算机学报;2006年04期
2 张京良;张跃宇;王育民;;车载网络中基于群签名的可保护隐私的车辆认证[J];武汉理工大学学报(交通科学与工程版);2008年03期
,本文编号:2216256
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2216256.html